Abstract
Current research often focuses on the design of new methods that extend the well-established role of biometrics in authentication and identification into key management and cryptography. Methods have been proposed that involve biometric-governed access to cryptographic keys, as well as methods that utilize biometric samples to derive keys for specialized encryption algorithms. The aim of this paper is to present a possible method for random number generation from repeated measurements of fingerprints as an alternative approach to the proposed applications of biometrics in cryptography, and to analyze some of its properties. Such method could provide a valuable source of ranomness in mobile devices equipped with a fingerprint scanner.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bouda, J., Krhovjak, J., Matyas, V., Svenda, P.: Towards true random number generation in mobile environments. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol. 5838, pp. 179–189. Springer, Heidelberg (2009)
Feng, H., Wah, C.C.: Private key generation from on-line handwritten signatures. Information Management & Computer Security, 159–164 (2002)
Gerguri, S., Matyáš, V., Říha, Z., Smolík, L.: Generating random sequences from fingerprints. In: MEMICS 2008, pp. 51–59 (2008
Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers 55(9), 1081–1088 (2006)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the Sixth ACM Conference on Computer and Communications Security (1999)
Krhovják, J., Švenda, P., Matyáš, V.: The source of randomness in mobile devices. In: Proceeding of the 12th Nordic Workshop on Secure IT Systems, pp. 73–84. Reykjavik University, Kringlan 1, 103 Reykjavik (2007)
Li, X., Wu, X., Qi, N., Wang, K.: A novel cryptographic algorithm based on iris feature. In: International Conference on Computational Intelligence and Security, vol. 2, pp. 463–466 (2008)
Casta nón, L.E.G., Reigosa, M.P., Nolazco-Flores, J.A.: Biometric-iris random key generator using generalized regression neural networks. In: Ali, M., Dapoigny, R. (eds.) IEA/AIE 2006. LNCS (LNAI), vol. 4031, pp. 530–539. Springer, Heidelberg (2006)
Ramírez-Ruis, J.A., Pfeiffer, C.F., Nolazco-Flores, J.A.: Cryptographic keys generation using fingercodes. In: Sichman, J.S., Coelho, H., Rezende, S.O. (eds.) IBERAMIA 2006 and SBIA 2006. LNCS (LNAI), vol. 4140, pp. 178–187. Springer, Heidelberg (2006)
Szczepanski, J., Wajnryb, E., Amigó, J.M., Sanchez-Vives, M.V., Slater, M.: Biometric random number generators. Computers & Security 23 (February 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP International Federation for Information Processing
About this paper
Cite this paper
Gerguri, S., Matyáš, V., Říha, Z., Smolík, L. (2010). Random Number Generation Based on Fingerprints. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds) Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. WISTP 2010. Lecture Notes in Computer Science, vol 6033. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12368-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-12368-9_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12367-2
Online ISBN: 978-3-642-12368-9
eBook Packages: Computer ScienceComputer Science (R0)